The federal grant funding can be used to pay for identity verification services, cybersecurity, or other expenses related to fraud detection. Fraudsters were busy during the...
The Defense Department office charged with investigating potential insider threats wants to use social media to add context to allegations. The Defense Counterintelligence and Security Agency...
The agency is inviting interested parties to weigh in on plans to ensure contractors follow best cyber hygiene practices. The Department of Homeland Security will conduct...
The memo follows up President Joe Biden’s executive order in May. Federal agencies have 60 days to identify critical software in their systems and one year...
A cyberespionage group has been discovered targeting critical infrastructure organizations based in Southeast Asia. The threat group is apparently based in China and interested in exploiting...
Remote work promises to make the workforce more responsive and efficient, but it also presents significant security challenges, a former ODNI cyber chief says. While telework...
The White House is working on plans to roll out new cryptographic systems that will require epic levels of funding from Congress and coordination, both within...
Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp. End-to-end encryption is technology that scrambles messages...
Enterprise security teams need to move from the consumption of crowdsourced threat intelligence (CTI) to an additional mode of contribution Cybersecurity has an information sharing problem....
The effort includes partnerships with several major tech companies. The Cybersecurity and Infrastructure Security Agency will work with agency stakeholders and new private-sector partners to minimize...